Chapter 10: Electronic Commerce Security. Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
E-Business Risks Chapter Seven. E-Business Models EDI Web pages The online environment Distributed e-business and intranets Supply chain linkage Collaborative.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Chapter 10: Electronic Commerce Security
Principles of Information Security, 2nd edition1 Cryptography.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Implementing Security for Electronic Commerce
1 Encryption What is EncryptionWhat is Encryption Types of EncryptionTypes of Encryption.
Using Internet Information Server And Microsoft ® Internet Explorer To Implement Security On The Intranet HTTP.
Chapter 10: Electronic Commerce Security
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
E-Commerce: The Second Wave Fifth Annual Edition
Security on the Internet Jan Damsgaard Dept. of Informatics Copenhagen Business School
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Copyright © Terry Felke-Morris WEB DEVELOPMENT & DESIGN FOUNDATIONS WITH HTML5 7 TH EDITION Chapter 12 Key Concepts 1 Copyright © Terry Felke-Morris.
SMUCSE 5349/49 Security. SMUCSE 5349/7349 Threats Threats to the security of itself –Loss of confidentiality s are sent in clear over.
1 Web Developer Foundations: Using XHTML Chapter 12 Key Concepts.
Chapter 3 Mohammad Fozlul Haque Bhuiyan Assistant Professor CITI Jahangirnagar University.
Copyright ©1997 NetDox, Inc. All Rights Reserved. CONFIDENTIAL 1 DATE HERE Julie Grace - NetDox, Inc. Emerging Internet Commerce.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
CIS 1310 – HTML & CSS 12 E-Commerce Overview. CIS 1310 – HTML & CSS Learning Outcomes  Define E-commerce  Identify Benefits & Risks of E-Commerce 
Linux Networking and Security Chapter 8 Making Data Secure.
1 Web Developer Foundations: Using XHTML Chapter 12 E-Commerce Overview Modified by Linda Kenney November, 2006.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Web Development & Design Foundations with XHTML Chapter 12 Key Concepts.
Chapter 7: E-Commerce Security and Payment system
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Section 12.1 Discuss the functions of a Web site Create a feedback form Compare and contrast option buttons and check boxes Section 12.2 Explain the use.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Chapter 10: Electronic Commerce Security Electronic Commerce, Sixth Edition.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Digital Signatures and Digital Certificates Monil Adhikari.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
Electronic Banking & Security Electronic Banking & Security.
Web Development & Design Foundations with XHTML Chapter 12 Key Concepts.
Copyright © Terry Felke-Morris Web Development & Design Foundations with HTML5 8 th Edition CHAPTER 12 KEY CONCEPTS 1 Copyright.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Chapter 5a - Pretty Good Privacy (PGP)
Web Development & Design Foundations with HTML5 8th Edition
Chapter 5 Electronic Commerce | Security
E-Commerce Security.
12 E-Commerce Overview.
Chapter 5 Electronic Commerce | Security
The Secure Sockets Layer (SSL) Protocol
Unit 8 Network Security.
Electronic Payment Security Technologies
Presentation transcript:

Chapter 10: Electronic Commerce Security

Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million e-commerce sales lost because of security concerns. Another $1 billion lost because of shoppers refusing to shop online due to security concerns. Nearly half of all online U.S. adults have concerns about online information security It impacts all Online Commerce online commerce (online banking, online shopping and Gartner, Inc

Electronic Commerce, Seventh Annual Edition3 Security for Client Computers First-party cookies –Cookies placed on a client computer by a Web server site Third-party cookies –Originates on a Web site other than the site being visited (e.g., DoubleClick) Web bug –Tiny 1-pixel graphic that a third-party Web site places on another site’s Web page to track activity. (Also – Web Beacon, Transparent Gif)

Electronic Commerce, Seventh Annual Edition4 A Web Bug Scenario Here a 3rd-party tracking site is tracking how much merchandise was purchased for a particular banner ad campaign. In this scenario the individual user remains anonymous, even though their buying habits are disclosed.

Electronic Commerce, Seventh Annual Edition5

6 ActiveX Controls An ActiveX control is an object containing programs and properties that Web designers place on Web pages ActiveX components can be constructed using different languages programs but the most common are C++ and Visual Basic Intended for creating Website functionality but can be used to create malicious content.

Electronic Commerce, Seventh Annual Edition7 Scripting Languages JavaScript developed by Netscape to enable Web page designers to build active content Intended for creating Website functionality but can also be used to create malicious content.

Electronic Commerce, Seventh Annual Edition8 Digital Certificates A Digital Certificate is signed code that Authenticates the Sender. Issued by a Certification authority like Verisign or Thawte.

Electronic Commerce, Seventh Annual Edition9

10 Encryption Highlights Symmetric Encryption encodes a message with two private keys. Asymmetric Encryption uses a Public & Private Key. Asymmetric Encryption is used in typical Web- based E-Commerce. (SSL & SET) Pretty Good Privacy (PGP) is used to encrypt messages

Electronic Commerce, Seventh Annual Edition11 Hash Functions Used to ensure Message Integrity. Used to encrypt a Digital Signature Hash algorithms are one-way functions –There is no way to transform the hash value back to the original message

Electronic Commerce, Seventh Annual Edition12 Hash Digest

Electronic Commerce, Seventh Annual Edition13 Public Key Cryptography with Digital Signatures Secure Socket Layers (SSL) Protocol encrypted by the Hash function)) is received in a Digital Certificate)

Electronic Commerce, Seventh Annual Edition14 SECURITY DIMENSION ASPECT OF SECURITY PROVIDED HOW IS IT ACHIEVED? Integrity Protects from Alteration Hash Coding Non-Repudiation Proof Transaction Occurred 1-Server Log Files 2 - Digital Signature – Provides a Time Stamp (can use a Digital Time Stamp Service) AuthenticityProof of IdentityDigital Signature Privacy & Confidentiality Keeping Messages Private Encryption Availability & Authorization (Necessity) Controlling AccessPasswords, Access Levels, Policies & Procedures 5 Dimensions of E-Commerce & Network Security